Home

Description

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.37, a Stored XSS vulnerability was discovered in Open-WebUI's Notes PDF download functionality. An attacker can import a Markdown file containing malicious SVG tags into Notes, allowing them to execute arbitrary JavaScript code and steal session tokens when a victim downloads the note as PDF. This vulnerability can be exploited by any authenticated user, and unauthenticated external attackers can steal session tokens from users (both admin and regular users) by sharing specially crafted markdown files. This vulnerability is fixed in 0.6.37.

PUBLISHED Reserved 2025-11-18 | Published 2025-12-04 | Updated 2025-12-05 | Assigner GitHub_M




HIGH: 8.7CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 0.6.37
affected

References

github.com/...-webui/security/advisories/GHSA-8wvc-869r-xfqf exploit

github.com/...-webui/security/advisories/GHSA-8wvc-869r-xfqf

github.com/...ommit/03cc6ce8eb5c055115406e2304fbf7e3338b8dce

cve.org (CVE-2025-65959)

nvd.nist.gov (CVE-2025-65959)